Sciweavers

558 search results - page 91 / 112
» Electronic commerce
Sort
View
82
Voted
WIESS
2000
14 years 10 months ago
Operational Information Systems: An Example from the Airline Industry
Our research is motivated by the scaleability, availability, and extensibility challenges in deploying open systems based, enterprise operational applications. We present Delta�...
Van Oleson, Karsten Schwan, Greg Eisenhauer, Beth ...
SIGCOMM
2010
ACM
14 years 9 months ago
Empowering users against sidejacking attacks
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to a web-based service. To prevent SideJacking, a se...
Ryan D. Riley, Nada Mohammed Ali, Kholoud Saleh Al...
75
Voted
COMPSEC
2008
99views more  COMPSEC 2008»
14 years 9 months ago
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], ...
Rolf Oppliger, Ralf Hauser, David A. Basin
ECRA
2010
145views more  ECRA 2010»
14 years 9 months ago
Inferring preference correlations from social networks
Identifying consumer preferences is a key challenge in customizing electronic commerce sites to individual users. The increasing availability of online social networks provides on...
Tad Hogg
DSS
2008
99views more  DSS 2008»
14 years 9 months ago
A graphical shopping interface based on product attributes
Most recommender systems present recommended products in lists to the user. By doing so, much information is lost about the mutual similarity between recommended products. We prop...
Martijn Kagie, Michiel C. van Wezel, Patrick J. F....